Image

Europe & Middle East
Virtual Event

June 13, 2PM BST / 3PM CEST

Register Today

Agenda at a Glance

10-min

Welcome & Introduction
Ray Brancato, CEO, Tufin

30-min

Keynote - Shifting the paradigm of cloud security and the impact of AI
Dr. Dorit Dor, CTO, Check Point

30-min

Where NetSec Meets the Cloud
Alon Buteliano, Director of Product Management

Compliance Automation with Rule Lifecycle Management
Katherine Schuh, Product Manager

Automation Best Practices with Johnson Controls
Erez Tadmor, Field CTO, Tufin 

Hiruy Demoz, Sr. Manager of Global Network Architecture, Johnson Controls

30-min

Extend Azure Security Controls to Your Network Infrastructure with Tufin
Hadas Lahav, Director of Product Management-Automation, Tufin

Alon Buteliano, Director of Product Management, Tufin

Anupam Vij, Group Product Manager, Microsoft

Nobody Loves Excel – Visibility, Segmentation, Audit and Automation with Tufin
Chris Kolling, Senior Director, Product Marketing, Tufin

Mikel Schreiber, Head of Security & ISO @ SWISS TXT AG
(the ICT Competence Centre of SRG SSR)

Fireside Chat: The Zero Trust Journey
Erez Tadmor, Field CTO, Tufin 

Jonathan Nguyen-Duy, Field CISO, Intel Corporation 

30-min

AI-Powered Innovation at Tufin
Hadas Lahav, Director of Product Management-Automation, Tufin

Sagi Bar-Zvi, VP of Sales Engineering & Customer Success, Tufin

IPAM Mastery: Insights on Deployment and Management 
Damiano Di Carlo, Professional Services Engineer, Tufin

Shawn Babinyecz, Professional Services Solution Architect, Tufin

SASE: The Future of Secure Access Services Edge
Jacob Ben Shabat, Product Manager, Tufin

45-min

Vision for the Future: Tufin and AKIPS Product Roadmap
Ruth Gomel-Kafri, VP of Product Management, Tufin

5-min

Closing & Raffle
Brian Gladstein, CMO, Tufin

Hear what you will learn during Tufinnovate from Tufin’s Executive Team

Keynote Speaker,

Dr. Dorit Dor

Chief Technology Officer at Check Point

Shifting the paradigm of cloud security and the impact of AI

Cloud infrastructure can readily adapt to changing business conditions, and at the same time this fluid and sometimes ephemeral infrastructure hides risks, complicates remediation and often the CISOs lose control to DevOps. Check Point believes that it is time to shift the paradigm of network security in the cloud.

As artificial intelligence (AI) permeates our lives, it's crucial to address the cybersecurity challenges it presents. Dor will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks of AI.

Dr. Dorit Dor is the Chief Technology Officer at Check Point Software Technologies and she spearheads Check Point’s rocket initiatives. Since joining the company in 1995, Dr. Dor has served in several pivotal roles in Check Point’s R&D organization over the years, including Chief Product Officer.

Image
Participants will learn:
Image

The roles and strategies for managing network security in the cloud

Image

Insights into the "front door / back door" perspective on network security

Image

An understanding of the challenges and opportunities presented by AI in network security

Breakout Sessions 1

Where NetSec Meets the Cloud

Presenter:

Alon Buteliano
Director of Product Management, Tufin

Where NetSec Meets the Cloud

Learn integration strategies and best practices for hybrid-cloud environments.
Image

Compliance Automation with Rule Lifecycle Management

Presenter:

Katherine Schuh
Product Manager, Tufin

Compliance Automation with Rule Lifecycle Management

Automate and optimize security policy management for continuous compliance.
Image

Automation Best Practices with Johnson Controls

Presenter:

Erez Tadmor
Field CTO, Tufin

Customer Speaker:

Hiruy Demoz
Sr. Manager of Global Network Architecture, Johnson Controls

Automation Best Practices with Johnson Controls

Join Hiruy Demoz and Erez Tadmor as they discuss how Johnson Controls optimized network security operations with Tufin Orchestration Suite, reducing attack surface, accelerating netsec processes, audit compliance, and enhancing control and visibility.
ImageImage

Breakout Sessions 2

Extend Azure Security Controls to Your Network Infrastructure with Tufin

Moderator:

Hadas Lahav
Director of Product Management - Security Automation, Tufin

Presenter:

Alon Buteliano
Director of Product Management, Tufin

Featuring:

Anupam Vij
Group Product Manager, Microsoft

Extend Azure Security Controls to Your Network Infrastructure with Tufin

Join this moderated discussion with Microsoft and Tufin product owners about Azure security controls and Tufin’s integrations with Microsoft.
ImageImageImage

Nobody Loves Excel – Visibility, Segmentation, Audit and Automation with Tufin

Presenter:

Chris Kolling
Senior Director, Product Marketing, Tufin

Featuring:

Mikel Schreiber
Head of Security & ISO @ SWISS TXT AG
(the ICT Competence Centre of SRG SSR)

Nobody Loves Excel – Visibility, Segmentation, Audit and Automation with Tufin

Learn about the successful implementation of Tufin's SecureTrack+ and SecureChange+ at SwissTXT AG, focusing on how these tools enhanced network visibility, centralized management, automated audit processes, and improved security management across multiple firewall vendors, allowing them to finally move away from Excel spreadsheet-based network security policy management.
ImageImage

Fireside Chat: The Zero Trust Journey

Presenter:

Erez Tadmor
Field CTO, Tufin

Featuring:

Jonathan Nguyen-Duy
Field CISO, Intel Corporation

Fireside Chat: The Zero Trust Journey

Implement and manage Zero Trust architectures effectively.
ImageImage

Breakout Sessions 3

AI-Powered Innovation at Tufin

Presenters:

Hadas Lahav
Director of Product Management-Automation, Tufin

Sagi Bar-Zvi
VP of Sales Engineering & Customer Success, Tufin

AI-Powered Innovation at Tufin

Learn how Tufin uses AI, including TufinMate and our integration with Microsoft Copilot, to boost network security efficiency and decision-making.
ImageImage

IPAM Mastery: Insights on Deployment and Management

Presenters:

Damiano Di Carlo
Professional Services Engineer, Tufin

Shawn Babinyecz
Professional Services Solution Architect, Tufin

IPAM Mastery: Insights on Deployment and Management

Dive deep into how to align your IPAM solutions with evolving network security needs.
ImageImage

SASE: The Future of Secure Access Services Edge

Presenter:

Jacob Ben Shabat
Product Manager, Tufin

SASE: The Future of Secure Access Services Edge

Uncover how Tufin strengthens network resilience and ensures comprehensive security policy management.
Image

Closing Session

Ruth Gomel-Kafri

VP of Product Management, Tufin

Vision for the Future:
Tufin and AKIPS Product Roadmap
Get an exclusive look at the future of Tufin’s and AKIPS’ network security management, monitoring, and response developments.

Image

Virtual Event Registration

Don't Miss Tufinnovate 2024!

This year's user conference will dive into "The Intersection of Cloud and Network Security".

As clouds and networks converge, the boundaries between traditional on-premises network security and cloud-based security measures are become increasingly blurred.

Join us at Tufinnovate 2024, Tufin's annual virtual user conference, and let’s cut through the complexity, exploring how breakthrough technologies and re-imagined processes will protect your growing digital footprint and evolving infrastructure.

What to Expect

Discover how to automate network security across hybrid cloud and the Edge for end-to-end visibility, continuous compliance, and enhanced security. 

  • Learn how to maximize the value of your Tufin investment
  • Dive into practical use cases and integrations
  • Hear from and network with industry peers
  • Get a sneak peek into Tufin's upcoming product roadmap
  • Connect with Tufin executive and product teams
Register

About Tufin

Tufin’s network security solutions fortify network security for large enterprises with complex operations and multi-vendor, hybrid-cloud networks. Tufin’s single network security operations platform automates and streamlines workloads for NetSec and CloudSec teams, ensuring they meet data protection regulations, comply with audits, and safeguard their organizations.

What People Are Saying

Learn how to effectively use AI.
AI can be effectively utilized to strengthen network security defenses and mitigate cyber threats.

- name here

Video testimonial to go here

FAQ

Frequently Asked Questions

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.